Threat Database Trojans Troj/PDFJs-WT

Troj/PDFJs-WT

By JubileeX in Trojans

Threat Scorecard

Ranking: 3,055
Threat Level: 20 % (Normal)
Infected Computers: 4,009
First Seen: April 6, 2012
Last Seen: September 20, 2023
OS(es) Affected: Windows

Corrupted PDF files can be used to bypass the filters of many (often not updated) security programs by taking advantage of various exploits in Acrobat Reader. Troj/PDFJs-WT refers to a kind of attack involving a malicious PDF file which hides the malicious code through a filter. Since many computer users still consider PDF files as a reliable, safe kind of file, Troj/PDFJs-WT attacks are more effective at targeting their victims through email spam attacks and malicious links than executable files or compressed archives. A filter is used to alter the data in a PDF in order to make the file readable as text or to make the file smaller by compressing the data. Criminals have found that using several layers of filtering in unconventional ways can be enough to obfuscate code in a way that bypasses an anti-malware scanner and allows the file to deliver its payload when it is opened by the victim.

How Troj/PDFJs-WT Attacks Use Filters to Hide Malicious Code

There are malicious PDF files that use image filters in order to hide malicious payloads. Other filters that can be used for a Troj/PDFJs-WT attack include the CCITTFax filter, which in combination with the ASCIIHex filter made the malicious code obfuscated enough to be undetectable. Basically, the criminals used several filters in succession, repeatedly using the ASCIIHex filter in order to hide the malicious code. While these filters have legitimate uses that allow certain data to be displayed and read as text or to be compatible with Fax components, criminals have found that they can convert their malicious code into what seems to be a harmless encoded stream to a security application.

However, once the filtered file is opened, it results in an exploit that takes advantage of the CVE-2010-2883 vulnerability, which should be patched in the latest versions of Adobe Reader. Troj/PDFJs-WT attacks are just one more way that criminals can use to make computer users vulnerable by using Adobe Software. Because of this, ESG malware analysts strongly advise against downloading any PDF files from a dubious source, such as an unsolicited email or an illegal file-sharing service. It is also important to close any potential exploits by keeping your Adobe software fully updated with the latest patches.

URLs

Troj/PDFJs-WT may call the following URLs:

music-online.me

Trending

Most Viewed

Loading...